Search the dblp DataBase
Amr M. Youssef :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Amr M. Youssef , Guang Gong Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:15-20 [Conf ] Amr M. Youssef , Guang Gong Hyper-bent Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:406-419 [Conf ] Amr M. Youssef , Guang Gong On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:109-120 [Conf ] Amr M. Youssef , Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:214-222 [Conf ] Amr M. Youssef , Stafford E. Tavares Information Leakage of a Randomly Selected Boolean Function. [Citation Graph (0, 0)][DBLP ] Information Theory and Applications, 1995, pp:41-52 [Conf ] Guang Gong , Amr M. Youssef On Welch-Gong Transformation Sequence Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:217-232 [Conf ] Amr M. Youssef Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:29-38 [Conf ] Amr M. Youssef , Guang Gong Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:49-59 [Conf ] Amr M. Youssef , Stafford E. Tavares Affine equivalence in the AES round function. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2005, v:148, n:2, pp:161-170 [Journal ] Amr M. Youssef , Stafford E. Tavares , Guang Gong On some probabilistic approximations for AES-like s-boxes. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal ] Amr M. Youssef , Stafford E. Tavares Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:56, n:5, pp:249-252 [Journal ] Amr M. Youssef , Stafford E. Tavares Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion". [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:60, n:5, pp:271-275 [Journal ] Guang Gong , Amr M. Youssef Cryptographic properties of the Welch-Gong transformation sequence generators. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal ] Z. Saber , Mohammad Faisal Uddin , Amr M. Youssef On the existence of (9, 3, 5, 240) resilient functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2269-2270 [Journal ] Xuxin Xu , Lingyu Wang , Amr M. Youssef , Bo Zhu Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:177-193 [Conf ] Ren Wang , Amr M. Youssef , Ahmed K. Elhakeem Artificial life feature selection techniques for spam e-mail filters. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 2006, pp:102-107 [Conf ] Ren Wang , Amr M. Youssef , Ahmed K. Elhakeem On Some Feature Selection Strategies for Spam Filter Design. [Citation Graph (0, 0)][DBLP ] CCECE, 2006, pp:2186-2189 [Conf ] Mohammad Faisal Uddin , Amr M. Youssef An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. [Citation Graph (0, 0)][DBLP ] CCECE, 2006, pp:1582-1585 [Conf ] Differential Fault Analysis of Rabbit. [Citation Graph (, )][DBLP ] Differential Fault Analysis of HC-128. [Citation Graph (, )][DBLP ] A Related-Key Attack on TREYFER. [Citation Graph (, )][DBLP ] A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs